Thursday, December 06, 2012

10 Worst Cyberattacks in 2012


Bangalore: When the world was too busy to catch up their breath from new technological launches be it iPhone 5, Windows 8, Gmail’s 10 GB attachments or serious inroads into cloud connectivity which enabled working on the go, there were other elements of the tech-world snarling to pounce.


Cybercriminals too evolved to deal with new technology growth and designed clever ways to sneak away millions from unsuspecting consumers through malicious links, phishing scams and password hacks. The big company’s like Amazon, LinkedIn and others too put to embarrassment.   


Cybercrime prevention company ThreatMetrix has put together an infographic detailing the top 10 spookiest cyberattacks of the year so far. "With threats looming everywhere from banks and web browsers to online dating and social networking sites, this list is sure to leave you with goosebumps," the company says.


#10 Yahoo Voices


A hacker group called D33DS Company has dumped 453,492 usernames and passwords obtained in plaintext from a Yahoo! Voice service, formally known as Associated Content.


The usernames and passwords were posted online by the D33DS Company group. Apparently, hackers were able to get their hands on plaintext list of passwords and usernames using a MySQL injection attack.





#9 Android


The leading mobile platform in the world and its Google play sports about 700,000 apps. For hackers Android was too tempting an apple to resist, the result: currently about 198 million Android users’ memory cards are at the risk of wiping out clean with a malicious link or from a malicious app. Earlier this year the hackers developed a fake version of Instagram app which sent expensive text messages from the users’ phones.


#8 Wells Fargo


Wells Fargo & Company is an American multinational diversified financial services company with operations around the world. It is the fourth largest bank in the U.S. by assets and the largest bank by market capitalization. The bank’s website was recently hacked putting 70 million customers and 8.5 million active users’ data at risk.


Bank's Chief Financial Officer, Tim Sloan told Reuters that the cyber attacks were "pretty significant" but didn't cause customer losses or a major increase in expenses.


The group that calls itself the Cyber Fighters of Izz ad-din Al Qassam claimed credit for the attacks and said it to be a protest against the anti-Islam video posted on YouTube, reported Rueters.




#7 Amazon owned Zappos targeted


Zappos.com, the online shoe retailer owned by Amazon.com, got its internal network infiltrated by a cyber attacker.


More than 24 million customers personal information including: customers' names, e-mail addresses, billing and shipping addresses, phone numbers and the last four digits of customers’ credit card numbers were at hackers’ mercy.


However, database that stores customers' critical credit card and other payment data was not affected or accessed.


#6 Microsoft Internet Explorer


Internet Explorer got vulnerable to hackers when a security hole which was discovered in September. The hackers targeted some of the users by installing malicious software on Windows systems and had accessed personal.


The attacks prompted the German government and security experts to urge people to temporarily stop using the browser, reported IBN Live. 


However Microsoft acted fast and fixed a security bug in Internet Explorer.


#5 Global Data Inc (Visa and Master Card)


Hackers breached data card processing systems and were successful in getting 1.5 million card numbers. However names, addresses and other data which could have led to massive money drain out, was not stolen. It was a very narrow escape.




#4 LinkedIn And eHormany


The professionals’ social networking siteLinkedIn and online dating site eHarmony were been hacked, about 64 million LinkedIn passwords were put at risk and about 30,000 passwords were cracked. About 1.5 million eHORMONY passwords were stolen and posted on an online password cracking forum. These combined attacks put the personal information of the million at risk.    


#3 Go Daddy


Go Daddy, the domain registrar and Web hosting firm, with more than 53 million registered domain names had suffered major outages following a major cyber attack, which potentially would have taken millions of sites down with it. The activist group Anonymous later claimed the responsibility however Go Daddy denied it. But it did result in many firms going for Go Daddy for a domain registration though.


#2 U.S. Environmental Protection Agency


Thousands of employees of the U.S. Environmental Protection Agency had their Social Security numbers, bank-routing information and addresses exposed in a cyber breach of an internal computer database, reported Bloomberg. It compromised 8000 employees’ and others’ social security numbers and banking information.


#1 Gostshell


An Anonymous-related group, Ghostshell leaked 120,000 records from the top universities by injecting malware and vulnerable links.







Difference between 40 pin and 80 pin IDE/ATA data cables


1. 40 Pin IDE/ATA CABLE
· Each IDE/ATA channel uses one IDE/ATA cable. The cable that has been used for over a decade on this interface was once just called "an IDE cable", since there was only one kind (with the exception of special cable select cables.) Today, however, there is also the new 80-conductor Ultra DMA cable;
· A standard IDE cable is a rather simple affair: a flat ribbon cable, normally gray in color, with a (usually red) stripe running down the edge. The cable has 40 wire connectors in it, and usually has three identical female connectors: one is intended for the IDE controller (or motherboard header for PCs with built in PCI ATA controllers) and the other two are for the master and slave devices on the interface. The stripe is used to line up pin 1 on the controller (or motherboard) with pin 1 on the devices being connected, since the techniques used for keying the cables are not standardized.
clip_image002
A standard, 40-wire IDE/ATA cable. Note the presence of three black
connectors, and the 40 individual wires in the ribbon cable.
2. 80 PIN IDE/ATA CABLE
  • Requirement: The 80-conductor cable was first defined with the original Ultra DMA modes 0, 1 and 2, covering transfer speeds up to 33.3 MB/s
  • Cable Select Support and Drive Assignment: All 80-conductor cables that meet the ATA specifications support the cable select feature automatically.
  • Connector Assignments and Color Coding: For the first time, the 80-conductor cable defines specific roles for each of the connectors on the cable; the older cable did not. Color coding of the connectors is used to make it easier to determine which connector goes with each device:
    • Blue: The blue connector attaches to the host (motherboard or controller).
    • Gray: The gray connector is in the middle of the cable, and goes to any slave (device 1) drive if present on the channel.
    • Black: The black connector is at the opposite end from the host connector and goes to the master drive (device 0), or a single drive if only one is used.
clip_image004
A standard 80-conductor Ultra DMA IDE/ATA interface cable.
Note the blue, gray and black connectors, and the 80 thin wires.
The red marking on wire #1 is still present (but hard to see in this photo.)
3. Comparison between 40 pin and 80 pin IDE/ATA data cables
clip_image005
comparison of the wires used in 80-conductor and 40-conductor cables.
The 80-conductor cable is about the same width as the older style
because thinner gauge wires are used to make up the ribbon.